Vulnerability

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary CodeVeeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

2 months ago
Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader MalwareHackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware

A newly identified zero-day vulnerability in the widely used 7-Zip archiving software, designated as CVE-2025-0411. This critical flaw, which was…

2 months ago
Multiple Flaws in Dell PowerProtect Allow System CompromiseMultiple Flaws in Dell PowerProtect Allow System Compromise

Multiple Flaws in Dell PowerProtect Allow System Compromise

Dell has released a Critical Security Update (DSA-2025-022) for its PowerProtect Data Domain (DD) systems to address multiple vulnerabilities that could allow…

2 months ago
Alibaba Cloud Storage Flaw Exposes Data to Unauthorized UploadsAlibaba Cloud Storage Flaw Exposes Data to Unauthorized Uploads

Alibaba Cloud Storage Flaw Exposes Data to Unauthorized Uploads

A significant vulnerability has been discovered in the Alibaba Cloud Object Storage Service (OSS) that allows unauthorized users to upload…

2 months ago
CRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and RefitCRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and Refit

CRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and Refit

Security researchers have uncovered critical CRLF (Carriage Return Line Feed) injection vulnerabilities in two widely used .NET libraries, RestSharp and Refit. These flaws,…

2 months ago
Yeti Forensic Platform Vulnerability Allows Attackers to Execute Remote CodeYeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

Yeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

A critical security flaw has been identified in the popular Yeti Forensic Intelligence platform, exposing its users to unauthenticated remote…

2 months ago
Cisco Webex Chat Vulnerabilities Expose Organization Chat Histories to AttackersCisco Webex Chat Vulnerabilities Expose Organization Chat Histories to Attackers

Cisco Webex Chat Vulnerabilities Expose Organization Chat Histories to Attackers

A major cybersecurity vulnerability in Cisco Webex Chat (previously known as IMI Chat) has raised alarming concerns after it was…

2 months ago
TeamViewer Clients Vulnerability Leads to Privilege EscalationTeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its Windows clients. The company disclosed on…

2 months ago
Hackers Can Exploit AI Platform to Achieve Root Access via RCE VulnerabilityHackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

In a critical development within the AI industry, researchers at Noma Security have disclosed the discovery of a high-severity Remote…

2 months ago
Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure ADHackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing attacks in the identity and access…

2 months ago